Profile Hidden Markov Models utilize the information stored in a multiple sequence alignment such as its residues and conserved regions to assign probabilities at each column. This indicates areas in the sequences where similar functionality is observed. These probability weights are then combined to assign a sequence score, which is...
In the ever-evolving field of computer science (CS) education, the significance of teachers and their backgrounds have often been overshadowed by the predominant focus on students. Teachers in the K-12 often lack the necessary expertise and have limited support provided by existing CS-based curricula. While research on CS education effectiveness...
Spreadsheet language programs, which include commercial spreadsheets, are among the most common form of software in use today. Unlike more "traditional" forms of software however, spreadsheet language programs are created and maintained by end-users with little or no programming experience. As a result, a high percentage of these programs contain...
Is it possible to achieve some of the benefits of formal testing within the informal programming conventions of the spreadsheet paradigm? We investigate an approach that attempts to do so via the development of a testing methodology for this paradigm. The "What You See Is What You Test" (WYSIWYT) methodology...
Spreadsheets are arguably the most widely used programming language in use today, yet spreadsheets commonly contain errors. Research shows that regardless of the experience of the end user, an alarming number of spreadsheets contain errors (91% in recent field audits). Most spreadsheets are created by end users with little or...
Smart Manufacturing (SM) is envisioned to make manufacturing processes more efficient through automation and integration of networked information systems. Robotic arms are integral to this vision. However the benefits of SM, enabled by automation and networking, also come with cyber risks.
In this work, we propose an anomaly detection framework...
Many algorithms in parallel systems can be easily solved if we can generate a Hamiltonian cycle on the underly network. Finding Hamiltonian cycle is a well known NP-complete problem. For specific instances of regular graphs, such as Torus and Gaussian network, one can easily find Hamiltonian cycles. In this thesis,...
In some practical systems, most of the errors are of 1 → 0 type and 0 → 1
errors occur very rarely. In this thesis, first, the capacity of the asymmetric
channel is derived. The capacity of the binary symmetric channel (BSC) and the
Z-channel can be derived from this...
Ph.D. candidate Qi Wei's thesis consists of two projects: Chemotherapy Project: a study based on the research paper "Predicting chemotherapy response of various cancer types using a variational auto-encoder approach" submitted to the bioRxiv preprint archive and accepted by the BMC bioinformatics; and Wound Monitor Project: implementing and assessing analytics...
Learning to recognize objects is a fundamental and essential step in human perception and understanding of the world. Accordingly, research of object discovery across diverse modalities plays a pivotal role in the context of computer vision. This field not only contributes significantly to enhancing our understanding of visual information but...